Preferred Language
Articles
/
jcofarts-729
Semantic Analogy of Quran Text Content Found in Ornamental Figures in Islamic Architecture: وسام كامل عبد الامير
...Show More Authors

This study aims at creating an analogy between Quran text Contents as meanings that have representations as visional shapes within ornamental figures in Islamic architecture. The theoretical framework of the study deals with the concept of semantics and its parts, artistic contents of Quran texts, and ornamental figures in Islamic architecture. The study procedures included a population of (69) figures, (5) of them were chosen deliberately for analysis in accordance with a form that had been presented to a number of experts to ensure its validity. The study reached a number of conclusions, the most significant among them are: adopting natural denotation of direct reference in order to link the ornamental figure to the source it was taken from via depending on analogy of the realistic (source/blueprint) and the ornamental adapted (copy) as in animal and plant figures, which is pinpointed either (iconically) through the ornamental figure imitation of reality, and (indicatively) through linking cause to effect (consequence) to identify a hidden fact, and (symbolically) without relying on causality; analogy between Quran text content (meaning = an idea) and ornamental figures in Islamic architecture (the word) includes content of oneness and perfection and its representation in ornamental figures and content of order and abstractness as a view that goes beyond the obvious limits of figure to reach what lies behind that, and the content of repetition that involves repeating an event in terms of time and place in a cyclic way that imitates ornamentally prevalence, completion, and reproduction of new figures through reordering components; and the meaning underlining ornamental figures seeks to reflect an aesthetic picture of reality with a subjective vision of ornamental figures and an objective vision of the components employed in ornamenting Islamic architecture through the styles of (capturing and envisioning) which are divided into concrete: through direct capturing with a slight modification for aesthetic reasons as in trees and instinctive: through mental discerning and realization of figures order and the abstract connections within this order by (envisioning) a figure that turns what is mentally realized to an entity that has actual existence

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
EFFECT OF SALINE WATER AND POTASH FERTILIZER ON PROLINE CONTENT AND WATER POTENTAL IN PISUM SATIVUM L. (VAR.SENADOR CAMBADOS)
...Show More Authors

Filed experiment was conducted to test the effect of saline water and potassium fertilizers rate on proline and water potential of Pisum sativum L. (Var.Senador Cambados ) leaves . Treatments of the experiment included two levels of water salinity( 2, 7 dSm-1) as a main plot and fertilizer rates as a sub plot. Results indicated that irrigation of plant with saline water 7 dSm-1 and fertilization 150 kg/donum increased proline accumulation and water potential 0.31 mmol/g,-17.00 bar at 9 AM morning and 0.62 mmol/g , -21.00 bar at 3 PM afternoon ,Irrigating plant with a 2 dSm-1 and fertilization 300 kg/donum decreased proline accumulation and water potential of leaves 0.22 mmol/g, -16.00 bar at 9 A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
بحث ايضاح مفردات النص القراني: ريب انموذجا
...Show More Authors

بحث يتناول دلالات الفاظ القران الكريم 

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Computer Applications
Content-based Image Retrieval (CBIR) using Hybrid Technique
...Show More Authors

Image retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud

... Show More
View Publication
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
The propaganda content of the elements of expression in the face of the promotion of terrorist thought: (Military information of the popular crowd model)
...Show More Authors

The propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 20 1930
Journal Name
College Of Islamic Sciences
أثر الدكتور عبد الجبار الرفاعي في تفكيك بنية التعصب
...Show More Authors

ملخـــص البحــــث

 

ان اختلاف الناس في أديانهم في نظر الإسلام أمر طبيعي؛ لاختلاف عقولهم ومداركهم وأصول تربيتهم، لذلك يبين القرآن الكريم أنَّه سنة ماضية في جميع الخلائق، ومع هذا الاختلاف في الأديان والعقائد فإن ذلك لا يقتضي انعزال المجتمع المسلم عن غيره من المجتمعات؛ لأنَّه مدعو إلى التعارف والتلاقي مع جميع الناس، وتبليغ دعوة الله ورسالته، مما يؤدي إلى اختلاط المجتمع المسلم بغ

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (300)
Crossref (271)
Scopus Clarivate Crossref